To see the other types of publications on this topic, follow the link: Qualnet simulator.

Journal articles on the topic 'Qualnet simulator'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Qualnet simulator.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Balasundaram, Arthi, L. Rajesh, and K. Bhoopathy Bagan. "A Study on Fourth Generation Wireless Network Using QualNet Simulator." International Journal of Information and Electronics Engineering 5, no. 6 (2015): 441–45. http://dx.doi.org/10.7763/ijiee.2015.v5.575.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kadam, Sakshe, Piyush More, and Dr R. C. Jaiswal. "A Comparative Study of Network Simulators." International Journal for Research in Applied Science and Engineering Technology 11, no. 11 (2023): 312–14. http://dx.doi.org/10.22214/ijraset.2023.56468.

Full text
Abstract:
A network simulator is a tool that can simulate and analyze the behavior of computer networks. They are widely used by the research community to test and evaluate the performance of networks in a virtual environment before deploying them in the real world. The simulators allow the users to test the network without the need to physical hardware or any real time connections. We have studied and compared the detail features of the Network Simulators including the Qualnet simulator which we have implemented in our college.
APA, Harvard, Vancouver, ISO, and other styles
3

Lakshmanan, Thulasimani. "Performance analysis of mobile wimax handoff using qualnet simulator." Journal of Engineering and Technology 3, no. 2 (2013): 113. http://dx.doi.org/10.4103/0976-8580.113052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gawali, Deepali. "Analyzing Issues in Mobile Wimax Handover Using Qualnet Simulator." International Journal of Basic and Applied Science 1, no. 2 (2012): 226–33. http://dx.doi.org/10.17142/ijbas-2012.1.2.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Osman, Mazlan. "The Performance of AODV Routing Protocol Based On Dropped Packets and Throughput Metrics: A Simulation and Comparative Study for VANET." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 4, no. 2 (2013): 265–79. http://dx.doi.org/10.24297/ijmit.v4i2.4623.

Full text
Abstract:
Vehicular Ad hoc Network (VANET) is a challenging network environment in which communication between vehicles in highly fading environments, like an urban scenario, is unpredictable and difficult. In order to analyze the performance of routing protocols and applications, a few of network simulators could be applied such as GlomoSim, NS -2, OPNET, QualNet and NCTUns. In this dissertation, we study either hindering object and signal strength in VANET could affected the performance of AODV routing protocol or not and what are the other factors affect AODV performance. The performance analysis of
APA, Harvard, Vancouver, ISO, and other styles
6

Chandralekha, Mrs C. "Performance Study of Dymo on Demand Protocol using Qualnet 5.0 Simulator." IOSR Journal of Engineering 02, no. 08 (2012): 20–24. http://dx.doi.org/10.9790/3021-02852024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Emmanuel, Douglas Ikiomoye, Rotimi-Williams Bello, and Domor Mienye Ibomoiye. "Random Multiple Access Scheme Protocol." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 8, no. 7 (2019): 2150–52. https://doi.org/10.5281/zenodo.4453817.

Full text
Abstract:
Abstract: This paper considers random access protocol, which is part of multiple access scheme protocol. It focuses on carrying out a background research of the Aloha and CSMA family in terms of performance, throughput and offered load. Furthermore,  the paper presents, compares and discusses the measurements result obtained in Aloha’s and CSMA’s family in terms of throughput and offered load using Matrix Laboratory, C++ and QualNet simulator.
APA, Harvard, Vancouver, ISO, and other styles
8

Srivastava, Ashutosh, Sachin Kumar Gupta, Mamoon Rashid, K. Vengatesan, Abhishek Kumar, and Achintya Singhal. "An Exhaustive Comparative Study of Network Simulation Tool." Journal of Computational and Theoretical Nanoscience 18, no. 4 (2021): 1201–7. http://dx.doi.org/10.1166/jctn.2021.9397.

Full text
Abstract:
In ongoing situation framing communication network takes a lot of time and cost. So, actualizing a system isn’t simple. Test system assists with mimicking an ongoing domain. In this manner the moment and expenditure for the checking usefulness of a system have been condensed and it is easy to implements. Network simulator accelerates the research and development process. It includes a development environment to model a network type. The aspire of this dissertation is to explore the features of a variety of types of simulator-emulator and consider their disadvantages and advantages and deeply e
APA, Harvard, Vancouver, ISO, and other styles
9

Soni, Jitendra, and Kokila Uikey. "Comparative Study of AODV and ODMRP Routing Protocols." Oriental journal of computer science and technology 10, no. 3 (2017): 593–96. http://dx.doi.org/10.13005/ojcst/10.03.06.

Full text
Abstract:
Mobile ad-hoc Network [MANET] is the collection of mobile nodes deployed with the short-lived purpose. It is the most innovative and useful variety which provide the facility to establish communication without the prerequisite of any infrastructure. Here, wireless communication medium is usually used for communication and connection establishment purpose. Generally, it is deployed with mobile nodes but can be used for stationary design also. Open nature communication makes it vulnerable for several security threats. This paper has considered the simulation of AODV and ODMRP using Qualnet 5.2 s
APA, Harvard, Vancouver, ISO, and other styles
10

Arora, N. "Performance Analysis of AODV, DSR and ZRP in MANETs using QualNet Simulator." Journal of Engineering Science and Technology Review 6, no. 1 (2013): 21–24. http://dx.doi.org/10.25103/jestr.061.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Sharada, Ohatkar, Bankar Ankita, Chikhalikar Purva, and Gawade Ankita. "Analysis of VANET Protocols for Urban and Rural Area Using QualNet Simulator." Journal of Telecommunication Study 4, no. 1 (2019): 18–26. https://doi.org/10.5281/zenodo.2615585.

Full text
Abstract:
Vehicular Ad-hoc Network (VANET) a type of a wireless network is utilized for the cause of communication amid the vehicles and the Road Side Units (RSU). Essential applications of VANET are in Intelligent Transport System (ITS) that embraces safety-related services. VANET is a subset of Mobile Ad-hoc Network (MANET) which provides dynamic changes in topology and mobility along with high speed. VANET performs the network operation with greater efficiency and is highly reliable. The performance of VANET is tested with different protocols in urban and rural areas.  The scenarios for urban an
APA, Harvard, Vancouver, ISO, and other styles
12

Rathna, R., and D. Vinod. "Exploring machine learning-based traffic prediction in 5G networks using a QualNet simulator and STLSTM." i-manager's Journal on Mobile Applications and Technologies 9, no. 2 (2022): 1. http://dx.doi.org/10.26634/jmt.9.2.19317.

Full text
Abstract:
This paper aims to explore Machine Learning-based traffic prediction in 5G networks using the QualNet simulator and the Spatio-Temporal Long Short-Term Memory (STLSTM) model. The study evaluated the performance of the STLSTM model by comparing it with other models such as Long Short-Term Memory (LSTM), Gated Recurrent Unit (GRU), and Convolutional Neural Network (CNN). The evaluation metrics used for the simulation experiments included Packet Delivery Ratio (PDR), throughput, end-to-end delay, and jitter. The results showed that the STLSTM model outperformed the other models in terms of Root M
APA, Harvard, Vancouver, ISO, and other styles
13

R Sheelavantar, Praneeta, Shreedhar A Joshi, and Gopal A Bidkar. "Analysis and Modeling of Generic Mac Protocols in Wireless Sensor Network." International Journal of Engineering & Technology 7, no. 3.34 (2018): 530. http://dx.doi.org/10.14419/ijet.v7i3.34.19374.

Full text
Abstract:
Nowadays Wireless Sensor Networks are used everywhere, which plays an important role in recording the physical conditions of the environment and organizing the data collected at a central location. WSN has many applications in fields such as military, home automation, industries, commercial, battle field, food safety etc. This paper presents the analysis of Generic MAC Protocols with different routing protocols using Qualnet 7.4 simulator. The simulation result shows that comparing with other MAC protocols SLOT CSMA/CA gives better performance. Total unicast message sent, received, average end
APA, Harvard, Vancouver, ISO, and other styles
14

Bhat.M, Subramanya, Shwetha D, and Author Devaraju.J.T. ""A Performance Study of Proactive, Reactive and Hybrid Routing Protocols using Qualnet Simulator"." International Journal of Computer Applications 28, no. 5 (2011): 10–17. http://dx.doi.org/10.5120/3385-4696.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Kumar, Mahendra, and A. K. Jain. "Comparative Performance Analysis of Different Routing Protocols in Wireless Ad-hoc networks (IEEE 802.11)." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 8, no. 3 (2018): 874–86. http://dx.doi.org/10.24297/ijct.v8i3.3398.

Full text
Abstract:
Wireless Ad-hoc networks have lack of mass deployment. An Ad hoc wireless network has a dynamic nature that leads to constant changes in its network topology. There is an infrastructure less and decentralized network which need a robust dynamic routing protocol. This article presents performance comparison of wireless Ad-hoc network on different routing protocols. Network simulator QualNet 5.0.2 has been used to evaluate the performance of wireless networks with various routing protocols.
APA, Harvard, Vancouver, ISO, and other styles
16

Rathore, Deepika, Ashish Shukla, and Gautam Kumar Jaiswal. "Performance Evaluation of Weighted Round Robin Scheduling for WiMAX Networks Using Qualnet Simulator 6.1." IOSR Journal of Electronics and Communication Engineering 9, no. 2 (2014): 77–81. http://dx.doi.org/10.9790/2834-09257781.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Majeed, Jaber H., Najmah Abed Habeeb, and Waleed Khalid Al-Azzawi. "Performance investigations of internet protocol versions for mobile Ad-hoc network based on qualnet simulator." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 1 (2021): 497–504. https://doi.org/10.11591/ijeecs.v21.i1.pp497-504.

Full text
Abstract:
A mobile ad hoc network (MANET) can be seen as a mobile nodes collection having no support of fixed infrastructure and therefore its communication is totally dependent on the network's nodes. As a result of the mobility of nodes, rapid and unpredictable changes occur within the mobile ad hoc network (MANET) arrangements. Therefore, this makes the analysis of routing protocols very crucial so as to enhance efficient communication between the wireless nodes. IPv4 and IpV6 within the MANET is another issue of concern. IPv4 which has been traditionally used for ages and IPv6; predicted to be t
APA, Harvard, Vancouver, ISO, and other styles
18

Kumar Saini, Rakesh, Ritika Ritika, and Sandip Vijay. "Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Routing Algorithm." Bulletin of Electrical Engineering and Informatics 6, no. 1 (2017): 81–87. http://dx.doi.org/10.11591/eei.v6i1.577.

Full text
Abstract:
Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer,
APA, Harvard, Vancouver, ISO, and other styles
19

Arunachalam, Manikandan, and Balasubadra Kandasamy. "Cross-Layer Design for Downlink Scheduling Combined with Call Admission Control in Wireless Networks." Wireless Communications and Mobile Computing 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/3750380.

Full text
Abstract:
Scheduling with admission control is proposed based on the integration of the parameters of physical layer and MAC layer called cross-layer design. To achieve the throughput, resource allocation is carried out based on the adaptive modulation and coding (AMC) in the physical layer and scheduling in MAC layer with rate adaptation. When link adaptation is applied, the total energy consumed will be reduced, which will lead to the optimization. Here the physical layer and MAC layer parameters are jointly analyzed to achieve the cross-layer integration for the proposed problem. Based on this cross-
APA, Harvard, Vancouver, ISO, and other styles
20

Rakesh, Kumar Saini, Ritika, and Vijay Sandip. "Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Routing Algorithm." Bulletin of Electrical Engineering and Informatics 6, no. 1 (2017): 81–87. https://doi.org/10.11591/eei.v6i1.577.

Full text
Abstract:
Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer,
APA, Harvard, Vancouver, ISO, and other styles
21

H. Majeed, Jaber, Najmah Abed Habeeb, and Waleed Khalid Al-Azzawi. "Performance investigations of internet protocol versions for mobile Ad-hoc network based on qualnet simulator." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 1 (2021): 497. http://dx.doi.org/10.11591/ijeecs.v21.i1.pp497-504.

Full text
Abstract:
<span>A mobile ad hoc network (MANET) can be seen as a mobile nodes collection having no support of fixed infrastructure and therefore its communication is totally dependent on the network's nodes. As a result of the mobility of nodes, rapid and unpredictable changes occur within the mobile ad hoc network (MANET) arrangements. Therefore, this makes the analysis of routing protocols very crucial so as to enhance efficient communication between the wireless nodes. IPv4 and IpV6 within the MANET is another issue of concern. IPv4 which has been traditionally used for ages and IPv6; predicted
APA, Harvard, Vancouver, ISO, and other styles
22

Ismail, Nahidah Hussein, and Basheer Yousif Mohsin. "Qualnet performances of grid-based clustering For WSN's routing protocols." Indonesian Journal of Electrical Engineering and Computer Science 17, no. 1 (2020): 448. http://dx.doi.org/10.11591/ijeecs.v17.i1.pp448-456.

Full text
Abstract:
<span>The wireless sensor networks (WSNs) believed to be as a hot research area due to their ranges in various fields of applications. Clustering is the more efficient techniques considered to resolve the problems of energy consumption in WSNs. The clustering has assured its effectiveness, specifically with high dynamic networks at which all nodes are represented in the clustering and all the data value can be collecting by sensor nodes with a cluster head (CH). The energy consumption as well as network traffic are balancing, the (CH) must be exchanged between all sensor nodes and the cl
APA, Harvard, Vancouver, ISO, and other styles
23

Nahidah, Hussein Ismail AL-Rekabi, and Yousif Mohsin AL-Sultani Basheer. "Qualnet performances of grid-based clustering for WSN's routing protocols." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 17, no. 1 (2020): 448–56. https://doi.org/10.11591/ijeecs.v17.i1.pp448-456.

Full text
Abstract:
The wireless sensor networks (WSNs) believed to be as a hot research area due to their ranges in various fields of applications. Clustering is the more efficient techniques considered to resolve the problems of energy consumption in WSNs. The clustering has assured its effectiveness, specifically with high dynamic networks at which all nodes are represented in the clustering and all the data value can be collecting by sensor nodes with a cluster head (CH). The energy consumption as well as network traffic are balancing, the (CH) must be exchanged between all sensor nodes and the clustering siz
APA, Harvard, Vancouver, ISO, and other styles
24

VeerSingh, Shiv, Rajeev Paulus, A. K. Jaiswal, and Anil Kumar. "To Evaluate the Performance of IEEE 802. 16 Routing Protocols using Qualnet 6. 1 Simulator." International Journal of Computer Applications 92, no. 3 (2014): 10–13. http://dx.doi.org/10.5120/15988-4940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Sahu, Vaishali, Gaurav Sharma, and Rajeev Paulus. "Study of Performance Variation of AODV Routing Protocol for Various Parameter Patterns using Qualnet Simulator." International Journal of Computer Applications 54, no. 6 (2012): 7–11. http://dx.doi.org/10.5120/8568-2285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Dhiraj, Nitnaware. "INVESTIGATION OF DETECTION AND PREVENTION SCHEME FOR BLACK HOLE ATTACK IN AODV FOR MANET." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 5, no. 11 (2018): 161–68. https://doi.org/10.5281/zenodo.1495289.

Full text
Abstract:
Black hole attack is one of the security challenges in MANET where the traffic is redirected to a node that actually does not exist in the network. The node drops the packet similar to real world equivalence to the Universe black hole where things disappear. The black hole node presents itself in such a way to the other nodes and networks that it knows the shortest path. This paper proposed detection and mitigation scheme to avoid black hole attack and improve the network performance. The complete work is simulated and evaluated on Qualnet simulator. Variable parameters taken are mobile node,
APA, Harvard, Vancouver, ISO, and other styles
27

Uppe, Nanaji. "A study on energy consumption and impact on network lifetime using ANODR and DYMO routing protocol in MANETs using QualNet simulator." i-manager's Journal on Communication Engineering and Systems 13, no. 1 (2024): 30. http://dx.doi.org/10.26634/jcs.13.1.20854.

Full text
Abstract:
This study examines energy consumption and the impact on network lifetime using ANODR and DYMO routing protocols in MANETs with the QualNet simulator. Both ANODR and DYMO are designed for MANETs but employ different approaches for establishing and maintaining routes among mobile nodes. ANODR adapts routing decisions based on neighborhood information, while DYMO operates on-demand, establishing routes only when necessary. To investigate energy consumption and network lifetime, simulations or experiments should be conducted to compare the performance of these protocols under various scenarios. A
APA, Harvard, Vancouver, ISO, and other styles
28

Singh, Vivek Kumar, Mukesh Kumar, A. K. Jaiswal, and Rohini Saxena. "Performance Comparison of AODV, OLSR and ZRP Protocol in MANET using Grid Topology through QualNet Simulator." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 8, no. 3 (2013): 862–67. http://dx.doi.org/10.24297/ijct.v8i3.3394.

Full text
Abstract:
In MANET mobile nodes are communicating through wireless medium and do not require any pre-existent infrastructure. In MANET all mobile nodes behaves as router and when required they takes part in discovery and maintenance of the route to the other node. Without the fixed base station the mobile nodes dynamically exchange data among themselves. Popularity of MANET has been increased because of the availability of license-free wireless communication devices. MANET can be used for disaster-management, business meetings, military operations, rescue operations, or in a situation, where temporary c
APA, Harvard, Vancouver, ISO, and other styles
29

Ganiga, Raghavendra, Balachandra Muniyal, and Pradeep Pradeep. "Characteristic Analysis of VoIP Traffic for Wireless Networks in Comparison with CBR using QualNet Network Simulator." International Journal of Computer Applications 50, no. 11 (2012): 25–31. http://dx.doi.org/10.5120/7815-1077.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Suman, Preetam, and Amrit Suman. "An Enhanced TCP Corruption Control Mechanism For Wireless Network." HCTL Open International Journal of Technology Innovations and Research (IJTIR) 1, January 2013 (2013): 27–40. https://doi.org/10.5281/zenodo.160894.

Full text
Abstract:
Mobile Ad Hoc networks are collections of mobile nodes, dynamically forming a temporary network without pre-existing network infrastructure or centralized administration. Transmission control protocol (TCP) provides connection oriented, reliable and end to end mechanism. Comparing to wire networks, there are many different characteristics in wireless environments. In this paper an improved mechanism for TCP corruption control is presented. It considers the influences sending rate to TCP sender's packet not only by the congestion but also by the corruption. The sending window size calculated af
APA, Harvard, Vancouver, ISO, and other styles
31

Mishra, Ayaskanta. "Performance Analysis of TCP Tahoe, Reno and New Reno for Scalable IoT Network Clusters in QualNet Network Simulator." International Journal of Computer Sciences and Engineering 6, no. 8 (2018): 347–55. http://dx.doi.org/10.26438/ijcse/v6i8.347355.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Alsaqour, Raed. "A Simulation Modeling Approach for the Performance of Proactive, Reactive and Position-based Routing Protocols in MANET." International Journal of Emerging Technology and Advanced Engineering 12, no. 9 (2022): 113–21. http://dx.doi.org/10.46338/ijetae0922_12.

Full text
Abstract:
Mobile Ad Hoc Network (MANET) hasrecently gotten much attention, especially regarding proactive, reactive, and position-based routing protocols. Routing protocols' primary objective is to transmit data packets from their source to their destination. Identifying the best routing protocol is a common problem in Ad Hoc networks. This paper presents a performance evaluation study of proactive, Open Shortest Path First (OSPF), reactive; Ad Hoc onDemand Distance Vector Routing (AODV), and positionbased routing; Location-Aided Routing (LAR1). The QualNet v5.1 simulator was used to conduct the perform
APA, Harvard, Vancouver, ISO, and other styles
33

Mayur, Tokekar, and D. Joshi Radhika. "Extension of Optimized Linked State Routing Protocol For Energy Efficient Applications." International Journal on AdHoc Networking Systems (IJANS) 1, no. 2 (2023): 15. https://doi.org/10.5281/zenodo.8413976.

Full text
Abstract:
Mobile Ad-hoc network (MANET) is infrastructure less network in which nodes are mobile, self reconfigurable, battery powered. As nodes in MANET are battery powered, energy saving is an important issue. We are using routing protocol to save energy so as to extend network lifetime. We have extended original Optimized Linked State Routing (OLSR) protocol by using two algorithms and named it as Enhancement in OLSR using Residual Energy approach (EOLSR-RE) and Enhancement in OLSR using Energy Consumption approach (EOLSR-EC). To analyze relative performance of modified protocol EOLSR-RE and EOLSR-EC
APA, Harvard, Vancouver, ISO, and other styles
34

Sharma, Jeetu, Manish K. Jha, and Partha P. Bhattacharya. "MultiChannel Caucus based MAC (MC2-MAC) Protocol for LOS Communication in Smart Grids." Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering) 12, no. 3 (2019): 232–41. http://dx.doi.org/10.2174/2352096511666180517102604.

Full text
Abstract:
Background: This paper proposes a novel MultiChannel Caucus based Medium Access Control (MC2-MAC) protocol to diminish collisions between different data packets to reduce energy dissipation of nodes and latency of data packets transmitted by the sensors communicating in Line of Sight (LOS) communication deployed to supervise distinct raucous provinces in the smart grid. Methods: The performance diminishing major problems such as wastage of battery power, bottlenecks and collisions need to be mitigated to elongate lifespan and to diminish data latency. The employment of caucus based efficient s
APA, Harvard, Vancouver, ISO, and other styles
35

Kumar, Sushil, and Anil Kumar Verma. "An advanced forwarding routing protocol for urban scenarios in VANETs." International Journal of Pervasive Computing and Communications 13, no. 4 (2017): 334–44. http://dx.doi.org/10.1108/ijpcc-d-17-00008.

Full text
Abstract:
Purpose The purpose of this paper is to give an insight in to the routing protocols in Vehicular ad hoc Network (VANET). In this direction, for the efficient data dissemination in VANETs, a street-based forwarding protocol (SBFP) has been proposed. Design/methodology/approach The interferences among different street segments are considered and a unique street-based forwarding concept is introduced to reduce the local maximum problem. In this protocol, the greedy forwarding concept along with the broadcasting mechanism and suppression technique is implemented to minimize the overhead created in
APA, Harvard, Vancouver, ISO, and other styles
36

Charan, Piyush, Tahsin Usmani, Rajeev Paulus, and Syed Hasan Saeed. "Performance Evaluation of AODV Protocol for Energy Consumption and QoS in IEEE 802.15.4 Based Wireless Sensor Network Using QualNet Simulator." Wireless Sensor Network 08, no. 08 (2016): 166–75. http://dx.doi.org/10.4236/wsn.2016.88014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Nanaji, Uppe, and S. Pallam Setty. "Investigation Misbehavior Configuration Nodes with Secure Neighborhood on Energy Consumption for DYMO Routing Protocol in MANETS." International Journal of Innovative Technology and Exploring Engineering 10, no. 3 (2021): 22–28. http://dx.doi.org/10.35940/ijitee.c8331.0110321.

Full text
Abstract:
We calculate misbehavior of energy consumption during configuration nodes between neighborhood nodes with specific investigation on secure environment with DYMP routing Protocol. An experimental analysis of DYMO, M-DYMO (misbehavior DYMO), S-DYMO (Secure-DYMO) has been carried out using QualNet 5.1 simulator. The simulation results have been derived using self-created network scenarios by incorporating secure neighborhood in de-facto DYMO by varying the network size as small, medium and large, Node Traversal Time, ART, Buffer Size. From the experiment results, it has been concluded that energy
APA, Harvard, Vancouver, ISO, and other styles
38

Upp, nanaji, and P. Setty S. "Investigation Misbehavior Configuration Nodes with Secure Neighborhood on Energy Consumption for DYMO Routing Protocol in MANETS." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 10, no. 3 (2021): 22–28. https://doi.org/10.35940/ijitee.C8331.0110321.

Full text
Abstract:
We calculate misbehavior of energy consumption during configuration nodes between neighborhood nodes with specific investigation on secure environment with DYMP routing Protocol. An experimental analysis of DYMO, M-DYMO (misbehavior DYMO), S-DYMO (Secure-DYMO) has been carried out using QualNet 5.1 simulator. The simulation results have been derived using self-created network scenarios by incorporating secure neighborhood in de-facto DYMO by varying the network size as small, medium and large, Node Traversal Time, ART, Buffer Size. From the experiment results, it has been concluded that energy
APA, Harvard, Vancouver, ISO, and other styles
39

Sathish, K., C. V. Ravikumar, Asadi Srinivasulu, and Anand Kumar Gupta. "Performance Analysis of Underwater Wireless Sensor Network by Deploying FTP, CBR, and VBR as Applications." Journal of Computer Networks and Communications 2022 (September 23, 2022): 1–30. http://dx.doi.org/10.1155/2022/7143707.

Full text
Abstract:
Oceans cover more than 75% of the planet’s land surface, making it the most water-rich place on the Earth. We know very little about oceans because of the extraordinary activities that take place in the depths. Underwater wireless sensors are devices that are able to monitor and record the physical and environmental parameters of their surroundings, as well as transmit these data in a continuous manner to one of the source sensors. The network that is formed by the collection of these underwater wireless sensors is referred to as an underwater wireless sensor network (UWSN). The analysis of pe
APA, Harvard, Vancouver, ISO, and other styles
40

Nand, Parma, and S. C. Sharma. "Mobility Based Performance Analysis DYMO, STAR and DSR Adhoc Routing Protocols." Advanced Materials Research 403-408 (November 2011): 3446–53. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.3446.

Full text
Abstract:
The wireless adhoc network is comprised of nodes (it can be static or mobile) with wireless radio interface. Each host is equipped with a CSMA/CA (carrier sense multiple access with collision avoidance) transceiver. These nodes are connected among themselves without central infrastructure and are free to move around. It is a multihop process because of the limited transmission range of energy constrained wireless nodes. This creates the scenario of multihop, where the packets originated from the source host are relayed through several intermediate hosts before reaching the destination. Routing
APA, Harvard, Vancouver, ISO, and other styles
41

Manpreet, Kaur, Rajni, and Singh Parminder. "An Encryption Algorithm to Evaluate Performance of V2V Communication in Vanet." International Journal on Cryptography and Information Security (IJCIS) 3, no. 2 (2020): 15–22. https://doi.org/10.5281/zenodo.4005540.

Full text
Abstract:
Wireless Communications are gaining more importance because they have opened new research fields by extending data networks connectivity to environments where wired solutions are difficult to install. The networks which are deployed in the areas where the needed infrastructure is not feasible to install are adhoc networks. Mobile Adhoc Networks (MANETs), in which each node acts as both data terminal and router uses wireless medium without the need of any centralized control. Vehicular Adhoc Networks (VANETs) are subset of MANETs. The successful deployment of vehicular communication requires Ve
APA, Harvard, Vancouver, ISO, and other styles
42

Amanjot, Singh Toor, and K. Jain A. "A Survey on Wireless Network Simulators." Bulletin of Electrical Engineering and Informatics 6, no. 1 (2017): 62–69. https://doi.org/10.11591/eei.v6i1.568.

Full text
Abstract:
The Network simulator helps the developer to create and simulate new models on an arbitrary network by specifying both the behavior of the network nodes and the communication channels. It provides a virtual environment for an assortment of desirable features such as modeling a network based on a specific criteria and analyzing its performance under different scenarios. This saves cost and time required for testing the functionality and the execution of network. This paper has surveyed various Wireless Network Simulators and compared them.
APA, Harvard, Vancouver, ISO, and other styles
43

Lee, Junhee, Wun-Cheol Jeong, and Byeong-Cheol Choi. "Multi-channel time division multiple access timeslot scheduling with link recovery for multi-hop wireless sensor networks." International Journal of Distributed Sensor Networks 13, no. 8 (2017): 155014771772631. http://dx.doi.org/10.1177/1550147717726311.

Full text
Abstract:
In this article, we propose a time division multiple access scheduling algorithm for end-to-end on-time packet delivery in multi-hop wireless sensor networks. Our proposed algorithm establishes a new communication path to substitute the old path including the link failed and schedules communication links on the new path by allocating timeslots satisfying end-to-end delay bound. Max–min optimization is employed to maximize the number of dedicated timeslots to establish the substitute path in the event of the next link failure. We evaluate the performance of the proposed algorithm using QualNet
APA, Harvard, Vancouver, ISO, and other styles
44

K, Sathish, Ravikumar CV, Rajesh A, and Giovanni Pau. "Underwater Wireless Sensor Network Performance Analysis Using Diverse Routing Protocols." Journal of Sensor and Actuator Networks 11, no. 4 (2022): 64. http://dx.doi.org/10.3390/jsan11040064.

Full text
Abstract:
The planet is the most water-rich place because the oceans cover more than 75% of its land area. Because of the unique activities that occur in the depths, we know very little about oceans. Underwater wireless sensors are tools that can continuously transmit data to one of the source sensors while monitoring and recording their surroundings’ physical and environmental parameters. An Underwater Wireless Sensor Network (UWSN) is the name given to the network created by collecting these underwater wireless sensors. This particular technology has a random path loss model due to the time-varying na
APA, Harvard, Vancouver, ISO, and other styles
45

Дячук, Ольга Юріївна, Марія Сергіївна Колощук, Оксана Олексіївна Окунькова та Володимир Володимирович Воротніков. "Комплексний аналіз програмного забезпечення для моделювання та емуляції комп’ютерних мереж: інструменти, застосування та майбутні напрями". Технічна інженерія, № 1(93) (17 липня 2024): 153–69. http://dx.doi.org/10.26642/ten-2024-1(93)-153-169.

Full text
Abstract:
У статті пропонується комплексний аналіз різноманітного програмного забезпечення для моделювання та емуляції комп’ютерних мереж, враховуючи як комерційні, так і рішення з відкритим вихідним кодом. Розглянуто широкий спектр інструментів, зокрема Cisco Packet Tracer, Cisco VIRL, UNetLab, Pnet Lab, EVE-NG, Boson NetSim, IMUNES, OPNET, eNSP, CML, D- Link TP-Link simulator, NS-3, GNS3, OMNeT++, Mininet, QualNet та CORE. Кожне програмне забезпечення проходить всебічний огляд на основі його функцій, підтримуваних протоколів, продуктивності, зручності використання та потенційного застосування в реальн
APA, Harvard, Vancouver, ISO, and other styles
46

Sathish, Kaveripakam, Ravikumar CV, Mohd Nadhir Ab Wahab, Rajesh Anbazhagan, Giovanni Pau, and Muhammad Firdaus Akbar. "Underwater Wireless Sensor Networks Performance Comparison Utilizing Telnet and Superframe." Sensors 23, no. 10 (2023): 4844. http://dx.doi.org/10.3390/s23104844.

Full text
Abstract:
Underwater Wireless Sensor Networks (UWSNs) have recently established themselves as an extremely interesting area of research thanks to the mysterious qualities of the ocean. The UWSN consists of sensor nodes and vehicles working to collect data and complete tasks. The battery capacity of sensor nodes is quite limited, which means that the UWSN network needs to be as efficient as it can possibly be. It is difficult to connect with or update a communication that is taking place underwater due to the high latency in propagation, the dynamic nature of the network, and the likelihood of introducin
APA, Harvard, Vancouver, ISO, and other styles
47

J.T., Dr Devaraju, Dr Mohana H.K., and Nethra H.S. "Load Based Carrier Aggregation Algorithm for LTE Advanced." International Journal of Innovative Technology and Exploring Engineering 11, no. 6 (2022): 53–60. http://dx.doi.org/10.35940/ijitee.f9917.0511622.

Full text
Abstract:
Long Term Evolution (LTE) supports transmission bandwidth upto 20MHz. Nowadays the multimedia rich applications connects billions of users worldwide. These services demands more number of Resource Blocks (RBs) to satisfy the Quality of Service (QoS) requirements and that can increase the data traffic in multifold. This crunch has led the Mobile Network Operators (MNOs) to increase the transmission bandwidth in order to fulfil the QoS requirements of the different services. In Release10, Third Generation Partnership Project (3GPP) provides a provision for MNOs to use Carrier Aggregation (CA) sc
APA, Harvard, Vancouver, ISO, and other styles
48

Sathish, K., C. V. Ravikumar, Asadi Srinivasulu, A. Rajesh, and Olutayo Oyeyemi Oyerinde. "Performance and Improvement Analysis of the Underwater WSN Using a Diverse Routing Protocol Approach." Journal of Computer Networks and Communications 2022 (November 9, 2022): 1–19. http://dx.doi.org/10.1155/2022/9418392.

Full text
Abstract:
The planet Earth is the most water-rich place because oceans cover more than 75% of its land area. Because of the extraordinary activities that occur in the depths, we know very little about oceans. Underwater wireless sensors are tools that can continuously transmit data to one of the source sensors while also monitoring and recording the physical and environmental parameters of their surroundings. An underwater wireless sensor network (UWSN) is the name given to the network created by the collection of these underwater wireless sensors. This particular technology is the most efficient way to
APA, Harvard, Vancouver, ISO, and other styles
49

Dr., Devaraju J.T, Mohana H.K. Dr., and H.S Nethra. "Load Based Carrier Aggregation Algorithm for LTE-Advanced." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 11, no. 6 (2022): 53–60. https://doi.org/10.35940/ijitee.F9917.0511622.

Full text
Abstract:
<strong>Abstract: </strong>Long Term Evolution (LTE) supports transmission bandwidth upto 20MHz. Nowadays the multimedia rich applications connects billions of users worldwide. These services demands more number of Resource Blocks (RBs) to satisfy the Quality of Service (QoS) requirements and that can increase the data traffic in multifold. This crunch has led the Mobile Network Operators (MNOs) to increase the transmission bandwidth in order to fulfil the QoS requirements of the different services. In Release10, Third Generation Partnership Project (3GPP) provides a provision for MNOs to use
APA, Harvard, Vancouver, ISO, and other styles
50

Jha, Amitkumar V., Bhargav Appasani, Deepak Kumar Gupta, and Taha Selim Ustun. "Analytical Design of Synchrophasor Communication Networks with Resiliency Analysis Framework for Smart Grid." Sustainability 14, no. 22 (2022): 15450. http://dx.doi.org/10.3390/su142215450.

Full text
Abstract:
The advent of synchrophasor technology has completely revolutionized the modern smart grid, enabling futuristic wide-area monitoring protection and control. The Synchrophasor Communication Network (SCN) is a backbone that supports communication of synchrophasor data among Phasor Measurement Units (PMUs) and Phasor Data Concentrators (PDCs). The operator at the control center can visualize the health of the smart grid using synchrophasor data aggregated at PDCs from several PMUs. Since the core of the SCN is the existing IP network as an underlying communication infrastructure, the synchrophaso
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!